{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:23:51Z","timestamp":1725560631444},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540282273"},{"type":"electronic","value":"9783540319078"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11538356_56","type":"book-chapter","created":{"date-parts":[[2005,9,27]],"date-time":"2005-09-27T10:24:05Z","timestamp":1127816645000},"page":"538-547","source":"Crossref","is-referenced-by-count":5,"title":["Modeling for Security Verification of a Cryptographic Protocol with MAC Payload"],"prefix":"10.1007","author":[{"given":"Huanbao","family":"Wang","sequence":"first","affiliation":[]},{"given":"Yousheng","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yuan","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"56_CR1","doi-asserted-by":"crossref","unstructured":"Burrows, M., Abadi, M., Needham, R.: A Logic of Authentication. Proceedings of the Royal Society, Series A\u00a0426(1871), 233\u2013271 (1989), Also appeared as SRC Research Report 39 and, in a shortened form. ACM Transactions on Computer Systems\u00a08(1), 18\u201336 (1990)","DOI":"10.1145\/77648.77649"},{"key":"56_CR2","unstructured":"Kindred, D.: Theory Generation for Security Protocols [Ph.D. Thesis]. Pittsburgh: Department of Computer Science, Carnegie Mellon University (1999)"},{"key":"56_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/3-540-61042-1_43","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"G. Lowe","year":"1996","unstructured":"Lowe, G.: Breaking and Fixing the Needham-Schroeder Public-key Protocol Using FDR. In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol.\u00a01055, pp. 147\u2013166. Springer, Heidelberg (1996)"},{"key":"56_CR4","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1109\/SECPRI.1995.398937","volume-title":"Proceedings of the 1995 IEEE Symposium on Security and Privacy","author":"J. Millen","year":"1995","unstructured":"Millen, J.: The Interrogator Model. In: Proceedings of the 1995 IEEE Symposium on Security and Privacy, pp. 251\u2013260. IEEE Computer Society Press, Los Alamitos (1995)"},{"issue":"2","key":"56_CR5","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/0743-1066(95)00095-X","volume":"26","author":"C. Meadows","year":"1996","unstructured":"Meadows, C.: The NRL Protocol Analyzer: An Overview. Journal of Logic Programming\u00a026(2), 113\u2013131 (1996)","journal-title":"Journal of Logic Programming"},{"key":"56_CR6","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/CSFW.1997.596788","volume-title":"10th IEEE Computer Security Foundations Workshop","author":"L.C. Paulson","year":"1997","unstructured":"Paulson, L.C.: Proving Properties of Security Protocols by Induction. In: 10th IEEE Computer Security Foundations Workshop, pp. 70\u201383. IEEE Computer Society Press, Los Alamitos (1997)"},{"issue":"2-3","key":"56_CR7","doi-asserted-by":"crossref","first-page":"191","DOI":"10.3233\/JCS-1999-72-304","volume":"7","author":"F. Javier Thayer F\u00e1brega","year":"1999","unstructured":"Javier Thayer F\u00e1brega, F., Herzog, J.C., Guttman, J.D.: Strand Spaces: Proving Security Protocols Correct. Journal of Computer Security\u00a07(2-3), 191\u2013230 (1999)","journal-title":"Journal of Computer Security"},{"key":"56_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1006\/inco.1998.2740","volume":"148","author":"M. Abadi","year":"1999","unstructured":"Abadi, M., Gordon, A.D.: A Calculus for Cryptographic Protocols: The Spi Calculus. Information and Computation\u00a0148, 1\u201370 (1999)","journal-title":"Information and Computation"},{"key":"56_CR9","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1109\/CSFW.2001.930143","volume-title":"14th IEEE Computer Security Foundations Workshop","author":"A. Gordon","year":"2001","unstructured":"Gordon, A., Jeffrey, A.: Authenticity by Typing in Security Protocols. In: 14th IEEE Computer Security Foundations Workshop, pp. 145\u2013159. IEEE Computer Society Press, Los Alamitos (2001)"},{"key":"56_CR10","series-title":"Electronic Notes in Theoretical Computer Science","volume-title":"Mathematical Foundations of Programming Semantics 17","author":"A. Gordon","year":"2001","unstructured":"Gordon, A., Jeffrey, A.: Typing Correspondence Assertions for Communication Protocols. In: Mathematical Foundations of Programming Semantics 17. Electronic Notes in Theoretical Computer Science, vol.\u00a045. Elsevier, Amsterdam (2001)"},{"issue":"5","key":"56_CR11","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1145\/324133.324266","volume":"46","author":"M. Abadi","year":"1999","unstructured":"Abadi, M.: Secrecy by Typing in Security Protocols. Journal of the ACM\u00a046(5), 749\u2013786 (1999)","journal-title":"Journal of the ACM"},{"key":"56_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/3-540-45315-6_2","volume-title":"Foundations of Software Science and Computation Structures","author":"M. Abadi","year":"2001","unstructured":"Abadi, M., Blanchet, B.: Secrecy Types for Asymmetric Communication. In: Honsell, F., Miculan, M. (eds.) FOSSACS 2001. LNCS, vol.\u00a02030, pp. 25\u201341. Springer, Heidelberg (2001)"},{"issue":"12","key":"56_CR13","first-page":"1087","volume":"33","author":"J. Huai","year":"2003","unstructured":"Huai, J., Li, X.: Algebraic Model and Security of Cryptographic Protocols. Science in China (Ser. E)\u00a033(12), 1087\u20131106 (2003)","journal-title":"Science in China (Ser. E)"},{"key":"56_CR14","doi-asserted-by":"crossref","unstructured":"Harkins, D., Carrel, D.: The Internet Key Exchange (IKE), RFC2409 (1998), Available at http:\/\/www.faqs.org\/rfcs\/rfcs2409.html","DOI":"10.17487\/rfc2409"}],"container-title":["Lecture Notes in Computer Science","Advances in Intelligent Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11538356_56.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T15:13:29Z","timestamp":1605626009000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11538356_56"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540282273","9783540319078"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/11538356_56","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}